The Good Tech Companies - UTXO Stack: The Complete Edition of the RGB++ Protocol Charting Bitcoin's Course

Episode Date: June 21, 2024

This story was originally published on HackerNoon at: https://hackernoon.com/utxo-stack-the-complete-edition-of-the-rgb-protocol-charting-bitcoins-course. Discover how t...he RGB++ protocol enhances Bitcoin's scalability and programmability through native solutions. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #bitcoin-scalability, #rgbpp-protocol, #utxo, #rgb++, #utxo-stack, #scalability, #bitcoin-native-solutions, #good-company, and more. This story was written by: @rgbpp. Learn more about this writer by checking @rgbpp's about page, and for more stories, please visit hackernoon.com. The UTXO Stack was recently better explained to some enthusiasts, developers, token holders, and newcomers who might have heard about or are just getting acquainted with it. The need to go the native way, says the co-founder of Nervos CKB, Cipher, “is not just a political thing, it is more about a native way that could provide a vital solution”

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. UTXO Stack, the complete edition of the RGB++ Protocol Charting Bitcoins course, by RGB++ Protocol. The UTXO Stack was recently better explained to some enthusiasts, developers, token holders, and newcomers who might have heard about or are just getting acquainted with it. The audience was schooled on what the RGB++ protocol stands for, the essence of its complete edition, and its plans. It began with highlighting the RGB++ protocol mission and positioning which center on constructing native programmability and scalability solutions for the Bitcoin co-system I.E. in a manner that is inherently native. The need to go the native way, says the co-founder
Starting point is 00:00:45 of Nervous CKB, Cypher, is not just a political thing, it is more about a native way that could provide a vital solution. Info This article is based on a talk by Cypher, the author of RGB++ Protocol, founder of Cell Studio, and co-founder of Nervous CKB at the Bitcoin RGB++ meetup on May 10, 2024 in Hong Kong. Click here to watch the video recap. What native means It refers to utilizing Bitcoin's inherent features, proof-of-work, POW, and unspent transaction outputs, UTXO. Only by leveraging these two features can a native approach be claimed as being used
Starting point is 00:01:24 to offer a superior solution. It differs completely from the Ethereum ecosystem which relies on an account model and proof of state, POS. In recent years, the Ethereum ecosystem has had various scalability solutions including Plasma, Sharding, the Raiden network, and Rollups. Rollups have emerged as the optimal solution for Ethereum's scalability because they fully capitalize on the advantages of the account model and PaaS. However, while it worked for Ethereum, the same assumption does not automatically apply to Bitcoin that rollups are its best solution. Rather, other or even better solutions are being explored.
Starting point is 00:01:59 These include the four primary directions for Bitcoin scalability or extension approaches. 1. Sidechains. These comprise a bridge, specifically multisig bridges, and an EVM-compatible layer 2, bridge plus EVM. Merlin, BEVM, and Satoshi VM are among the best examples. However, they are not truly Bitcoin layer 2 solutions but rather bridges to an Ethereum layer 2. Their security depends on the multisig bridge and there has been limited innovation in this area. Backslash.2. Rollups. To verify the layer 2 status directly on Bitcoin's layer 1, something special is needed in the Bitcoin script. So, a highly sophisticated technology like BitVM with the potential support of op underscore cat is meant to make achieving this easier though challenging. Meanwhile, there is a general belief
Starting point is 00:02:50 in the space that BitVM is not likely to complete its development within this current Bitcoin bull market cycle. Thus, the roll-up solution might be realized by the next bull market which is expected in the next four years. Backash dot three channels ln channels and the lightning network are called the bitcoin native scalability approaches we already have a mature lightning network operating on bitcoin with over 10 000 nodes and millions of users however this network currently only supports bitcoin if it could day, support stablecoins or other user-defined coins, it would be significantly more useful. The CKB team is also developing a CKB Lightning Network, which is expected to connect with the Bitcoin Lightning Network this year.
Starting point is 00:03:39 This is a very promising solution for Bitcoin though it is more dedicated to payment channels or networks and faces challenges. Backslash.4. CSV, Client-Side Validation. This is a Bitcoin-native solution available only for the UTXO model. Notable projects include RGB, Taproot Assets, and RGB++ Protocol. The problem, despite more than a hundred Layer 2 solutions being built on the Bitcoin chain, none has been able to address the programmability and scalability problem. The most mature Bitcoin Layer 2 solutions follow the multisig bridge plus EVM-compatible layer approach. They essentially bridge the real Bitcoin chain to another chain with Bitcoins that are not real, shadow or pseudo-Bitcoins. Without a truly native solution, the shadow Bitcoins remain unprogrammable and unscalable
Starting point is 00:04:25 because the real bitcoin remains on layer 1. There comes the RGB++ protocol's straightforward solution. It enables Turing-complete programmability directly on bitcoin layer 1 and extends to layer 2 to achieve scalability. Therefore, in a nutshell, the RGB++ protocol is not bitvm even though it can provide native Turing complete capability on Bitcoin Layer 1. It neither release in any new opcodes nor does it require hard forks or soft forks but rather directly provides programmability on Layer 1. It also is not an EVM or a rollup, and it does not need a bridge. RGB++, how it works. Every Bitcoin UTXO consists of two critical components, one for the amount field, variable, to indicate the Bitcoin contained within the UTXO and another
Starting point is 00:05:13 for the lock script which is akin to an address that signifies ownership and authority to unlock the UTXO. The RGB++ protocol attaches additional data as an extra program logic to the original Bitcoin UTXO. A single Bitcoin UTXO is linked with an off-chain data cell, or what is termed a Turing-complete UTXO. By connecting every on-chain UTXO with off-chain data and extra execution logic, the off-chain UTXO is transferred, despite being constrained by the script on the UTXO, whenever the original UTXO is transferred or spent. This allows the transfer of addition albits or assets from one UTXO to another, executing the script and effectively forging an off-chain transaction with off-chain state transfer from one state to another. This is the essence of the RGB++ protocol.
Starting point is 00:06:03 The method is referred to as isomorphic binding because the RGB++ protocol's off-chain state transitions are verified by another Turing complete UTXO-based POW chain, CKB, to ensure transaction accuracy. Compared to the original RGB protocol, which runs off-chain processes on the user's client, the RGB++ protocol runs these processes on the CKB chain. However, this is optional for users. Those who do not trust CKB can download the transaction or request the transaction history from the sender and verify it themselves. To explain the isomorphic binding technology further, look at the diagram above. The left side represents the Bitcoin transaction while the right side is for the CKB transaction. The CKB side could be considered an off-chain
Starting point is 00:06:50 transaction when compared to the Bitcoin on-chain transaction though it is an on-chain transaction when seen from the CKB perspective. The Bitcoin inputs and outputs sections signify asset or state ownership while the commitment, encoded in the OP underscore return field of the Bitcoin transaction, is a hash of the CKB transaction. The CKB transaction side includes a UTXO with a rich state, anything under smart contract protection. It also has a Bitcoin Lite client on the CKB chain that acts as a proof generator or verifier. When a transaction's proof is triggered, the smart contract verifies whether the transaction is correctly encoded in the Bitcoin commitment. This technology helps achieve a bi-directional binding of the Bitcoin transaction and UTXO
Starting point is 00:07:35 with the CKB transaction and CKB cell, ensuring that the transaction is controlled or constrained by the CKB smart contract. This is how programmability is achieved on the Bitcoin layer 1 with the RGB++ protocol. The basic knowledge of the RGB++ protocol and its use as the isomorphic binding method can be used to introduce the cross-chain leap action. Since the Bitcoin inputs and outputs sections signify asset or state ownership, transferring the ownership from a Bitcoin UTXO to another chain's UTXOE. Litecoin requires changing the isomorphic binding data structure from Bitcoin UTXO to Litecoin UTXO. However, when the transfer happens, nothing changes in the value IT carries.
Starting point is 00:08:20 This is the essence of the cross-chain leap. It eliminates the need for any bridges, either centralized or decentralized, while it enables a simple transfer from one chain to another. Verifying the transaction is also straightforward. It traces back the transaction history with the proof of the UTXO branch on one chain and another until it gets to the initial Bitcoin chain. A good example of how this acid leap is achieved can be seen in Bitcoin's first non-custodial PASCII wallet application, JoyID. With the JoyID wallet, assets can be leapt from Bitcoin Layer 1 to Layer 2 and back. It supports both fungible and non-fungible tokens as well as assets minted on Bitcoin
Starting point is 00:08:58 or CKB with the RGB++ protocol. Armed with these utilities, Layer 1 programmability and cross-chain leap technology the final step of the rgb plus plus protocol can be achieved creating a scalability extension for bitcoin layer 2. we can construct a utxo based layer 2 with pos verify pos without malicious activities to implement staking rewarding and slashing on Bitcoin Layer 1, the programmability layer provided by RGB++ protocol is used to run staking or slashing scripts which provide security to the UTXO Layer 2. This functionality enables assets to be leapt from UTXO Layer 2 to Layer 1 without any centralized or decentralized bridge. This is what UTXO stack does, as the complete
Starting point is 00:09:45 addition of the RGB++ protocol. For security and staking, Babylon or similar protocols will be introduced as the Bitcoin staking security provider for L2 chains while other tokens such as CK band RGB++ coins can be accepted as staking assets on layer 1 as programmed in the RGB++ protocol smart contracts. The security level for Bitcoin Layer 1 is identical to that of Bitcoin itself. It is guaranteed by Bitcoin's historic powchain. The security for Layer 2s is akin to an OP rollup on Ethereum, with an expected challenging period in which there will be a security cap that is similar to the deposit. After the challenging period is over, the security IS expected to be better. With this complete addition of the RGB++ protocol plan, the team and company are dedicated to
Starting point is 00:10:34 building the UTXO stack solution focusing on Bitcoin's scalability. The plan is to develop something akin to the OP stack plus Eigen layer for Bitcoin, which is UTXO-native and neither EVM-compatible nor has any bridge. It can integrate with future lighting networks and is expected to be the best solution for Bitcoin's extension instead of a roll-up solution. Efforts are ongoing to build on the robust community and ecosystem that have been cultivated so far with projects such as fungible token and non-fungible token marketplaces, launchpads, dobs, stable++, LeapX, Omega, Nervepe, Joyide Wallet, etc., tip click here to watch the video recap. Thank you for listening to this HackerNoon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.